Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions
AJ Perez, S Zeadally - Computer Science Review, 2022 - Elsevier
The advent of Blockchain and smart contracts is empowering many technologies and
systems to automate commerce and facilitate the exchange, tracking and the provision of …
systems to automate commerce and facilitate the exchange, tracking and the provision of …
{BareCloud}: Bare-metal analysis-based evasive malware detection
The volume and the sophistication of malware are continuously increasing and evolving.
Automated dynamic malware analysis is a widely-adopted approach for detecting malicious …
Automated dynamic malware analysis is a widely-adopted approach for detecting malicious …
Blockchain-based solutions for mobile crowdsensing: A comprehensive survey
Mobile crowdsensing (MCS) is an emerging data-driven paradigm that leverages the
collective intelligence of the crowd, their mobility, and the crowd-companioned smart mobile …
collective intelligence of the crowd, their mobility, and the crowd-companioned smart mobile …
Design, implementation and verification of an extensible and modular hypervisor framework
We present the design, implementation, and verification of XMHF-an eXtensible and
Modular Hypervisor Framework. XMHF is designed to achieve three goals--modular …
Modular Hypervisor Framework. XMHF is designed to achieve three goals--modular …
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet
today. Whenever an anti-malware solution becomes popular, malware authors typically …
today. Whenever an anti-malware solution becomes popular, malware authors typically …
Using hardware features for increased debugging transparency
With the rapid proliferation of malware attacks on the Internet, understanding these
malicious behaviors plays a critical role in crafting effective defense. Advanced malware …
malicious behaviors plays a critical role in crafting effective defense. Advanced malware …
Longitudinal study of the prevalence of malware evasive techniques
By their very nature, malware samples employ a variety of techniques to conceal their
malicious behavior and hide it from analysis tools. To mitigate the problem, a large number …
malicious behavior and hide it from analysis tools. To mitigate the problem, a large number …
[PDF][PDF] LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
Dynamic-analysis techniques have become the linchpins of modern malware analysis.
However, software-based methods have been shown to expose numerous artifacts, which …
However, software-based methods have been shown to expose numerous artifacts, which …
Hypervisor memory forensics
Memory forensics is the branch of computer forensics that aims at extracting artifacts from
memory snapshots taken from a running system. Even though it is a relatively recent field, it …
memory snapshots taken from a running system. Even though it is a relatively recent field, it …
{überSpark}: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor
We present überSpark (üSpark), an innovative architecture for compositional verification
of security properties of extensible hypervisors written in C and Assembly. üSpark …
of security properties of extensible hypervisors written in C and Assembly. üSpark …